Selecting an authentication protocol for your business

Authentication protocols serve as the backbone of online security, allowing users to securely confirm their identity and access protected information and services. They define how claimants (the users trying to…

The Medusa gang strikes again, targeting nearly 300 property owners in Fort Worth

THE Medusa ransomware gang earlier this week claimed responsibility for a March cyberattack on the Tarrant County Appraisal District and is threatening to disclose 218GB of stolen data with a…

New malware campaign that spreads via WSF files

April 10, 2024PressroomCybercrime/malvertising Cybersecurity researchers have discovered a new wave of Raspberry Robin campaigns propagating malware through malicious Windows Script Files (WSF) since March 2024. “Historically, Raspberry Robin was known…

Google gives Gemini a security boost

Gemini now has security features: Google has integrated Mandiant’s security offerings into its artificial intelligence (AI) platform, the company announced at the Google Cloud Next conference in Las Vegas. The…

The “eXotic Visit” spyware campaign targets Android users in India and Pakistan

April 10, 2024PressroomMobile security/spyware An active Android malware campaign called eXotic Visit has primarily targeted South Asian users, particularly those in India and Pakistan, with malware distributed via dedicated websites…

How nationwide DDoS attacks affect us all

COMMENT Today it is rare for a month to go by without any news distributed denial of service (DDoS) attacks driven by geopolitical instability. Now, a single attack can include…

The GitHub fake popularity scam tricks developers into downloading malware

April 10, 2024PressroomSoftware Security/Supply Chain Attack Threat actors are now exploiting GitHub’s search functionality to trick unsuspecting users searching for popular repositories into downloading spurious counterparts that serve malware. The…

Attack on electronics manufacturer boAt loses 7.5 million data

A hacker with no known precedent has leaked personal information belonging to millions of customers of boAt, an Indian consumer electronics company. The company is India’s leading manufacturer of wireless…

Researchers discover first Native Specter v2 exploit against Linux kernel

April 10, 2024PressroomHardware Security/Linux Cybersecurity researchers have revealed what they say is the “first native Specter v2 exploit” against the Linux kernel on Intel systems that could be exploited to…

92,000 D-Link NAS devices open to critical command injection bugs

A critical flaw in several end-of-life (EOL) models of D Link Network-attached storage (NAS) devices can allow attackers to place backdoors on the device and gain access to sensitive information,…